Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 1003 Vote(s) - 3.47 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Bug Bounty tools - Ultimate list

#1
If you practice the wonderful discipline of Bug Bounty, you probably already have a handy toolbox.

But if you're just starting out, the good news is that ethical hacker Kamil Vavra has compiled an "Awesome List" like only Github can host.

This list contains all the tools to recognize subdomains, technologies, ports...etc. and also exploitation such as command injection, SQL injection, XSS, XXE, File Inclusion...etc.

You'll have hours to look at and test all this and I think it will save you a lot of time.

To be discovered here:

[To see links please register here]

Reply

#2
Excellent contribution.

It'll take a month of Sundays to sift through the lot.
Reply

#3
Quote:(08-29-2022, 03:21 AM)mothered Wrote:

[To see links please register here]

Excellent contribution.

It'll take a month of Sundays to sift through the lot.

Very very provided indeed. But that's what we like!
Reply

#4
Quote:(08-29-2022, 08:28 AM)Troubilshow Wrote:

[To see links please register here]

Quote: (08-29-2022, 03:21 AM)mothered Wrote:

[To see links please register here]

Excellent contribution.

It'll take a month of Sundays to sift through the lot.

Very very provided indeed. But that's what we like!
Absolutely.

I've yet to come across an In depth contribution of this nature In a single resource.
Reply

#5
Quote:(08-29-2022, 11:02 AM)mothered Wrote:

[To see links please register here]

Quote: (08-29-2022, 08:28 AM)Troubilshow Wrote:

[To see links please register here]

Quote: (08-29-2022, 03:21 AM)mothered Wrote:

[To see links please register here]

Excellent contribution.

It'll take a month of Sundays to sift through the lot.

Very very provided indeed. But that's what we like!
Absolutely.

I've yet to come across an In depth contribution of this nature In a single resource.

I hope it will make people happy, I had to look hard to find it
Reply

#6
Bug Bounty tools have become increasingly popular in recent years, providing companies with the opportunity to detect and fix vulnerabilities in their IT systems. Standoff 365 has embraced this trend, offering a platform for conducting bug bounty programs with the help of ethical hackers. The Standoff 365 Bug Bounty program provides organizations with a space to host bug bounty programs and verify reports from external security researchers.

With the increasing number of cyber threats, companies can no longer afford to ignore the importance of securing their IT systems. The bug bounty program allows companies to identify vulnerabilities that may be exploited by malicious actors, and resolve them before they cause harm. By incentivizing security researchers to find and report vulnerabilities, companies can ensure that their IT systems are secure and protected.

In addition to the bug bounty program, Standoff 365 also provides a cyber training ground, the Standoff 365 Cyber Polygon. This simulated environment offers a realistic experience for information security professionals to hone their skills in tracking and repelling cyberattacks. The combination of the bug bounty program and cyber training ground provides a comprehensive solution for companies to protect their IT systems from cyber threats.

The Standoff 365 Bug Bounty (official website

[To see links please register here]

) is a valuable tool for companies that are serious about keeping their IT systems secure. With its real-world simulations and incentive-based approach, security researchers can help companies identify vulnerabilities and prevent cyberattacks.
Reply

#7
TY, awesome share and would like to explore this
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through